RSAC 2024 Day 2: IoT Security Questions (and Answers)

RSA Conference delivers in terms of interesting dialogues with other cybersecurity professionals, and this year while there is not much on the conference agenda related to IoT security there is a lot of discussion about it.  Whether it’s the UK’s Product Security law going into effect at the end of ... Read More

RSAC 2024: IoT Security Questions (and Answers)

The 2024 RSA Conference is underway, and Viakoo is out in force.  During the conference as we meet with customers, prospects, media, and analysts I will try to cherry pick some of the more interesting questions related to IoT Security.  Over the past year the number of IoT security breaches ... Read More

Urgency on Password Management

As a security professional I’d like you to consider the following scenario.  You’re constantly adding new laptops to your organization, devices that connect to your corporate networks and will hold and transit incredibly valuable and sensitive data.  All of these laptops come into your company with exactly the same password ... Read More

Unsafelok Threat Highlights It’s About Both IoT Devices and Applications

IoT devices and applications exist all over the place, and in high volume.  Today’s news brought yet another example of how the scale of IoT systems leads to the conclusion that their security is deeply dependent on automation.  Security researchers announced a hotel keycard hacking technique called “Unsafelok” which enables ... Read More

Survey on 2024 IoT Security Crisis

Surveys play an important role in setting strategy and choosing how to address a difficult situation.  Organizations today are urgently in need of addressing their IoT security situation; it’s the fastest growing part of the attack surface overall and the one security area most likely to be made worse by ... Read More

The Coming End of Biometrics Hastens AI-Driven Security

Until recently I thought we had a lot of time ahead of us to be secure in using biometrics to authenticate who I am and what I should have access to.  But then this morning I came across a story about GoldPickaxe, a app-based exploit aimed at gathering facial and ... Read More

Confessions on MFA and Security Best Practices

The last couple weeks have brought a few discussions on the topic of multifactor authentication or MFA (sometimes also referred to as 2FA or two factor authentication).  These discussions have been driven by the SEC’s X (formerly known as Twitter) account being hacked in order to goose the price of ... Read More

The Connection Between Alaska Airlines, Blown Out Windows, and IoT Security

| | Blog, firmware, iot, remediation
As the shock starts to wear off from hearing that a window blew out on a recent Alaska Airlines flight I came across research from our partner Nozomi Networks that might help to explain what happened (or could happen).  As reported in Ars Technica (Hackers can infect network-connected wrenches to ... Read More

10 IoT Security Predictions for 2024

| | Blog
Against a backdrop of uncertain economic conditions and geopolitical unrest, 2023 nears its end. But it isn’t all bad news. In the race against cyber criminal gangs and malicious threat actors in 2023 major catastrophes have not materialized, and the state of cyber defense is stronger than ever.  New solutions ... Read More

Extending Cybersecurity Awareness to IoT Devices

| | Blog
We’re at the end of Cybersecurity Awareness Month, which is a good time to reflect on where your organization needs to improve and extend it’s cybersecurity efforts.  If you’re like most organizations the answer is IoT devices and applications; it’s the fastest growing attack surface for most organizations and on ... Read More